Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
avik chakrabortiAssistant Professor at IAI, TCG CRESTVerified email at tcgcrest.org
Avijit DuttaInstitute for Advancing Intelligence, TCG-CRESTVerified email at tcgcrest.org
Ashwin JhaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Cuauhtemoc MancillasCentro de Investigación y de Estudios Avanzados, CINVESTAV-IPNVerified email at univ-st-etienne.fr
Debdeep MukhopadhyayProfessor, Dept of Computer Science and Engineering, IIT Kharagpur, IndiaVerified email at cse.iitkgp.ac.in
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
Rajat SadhukhanIndian Institute of Technology Roorkee, IndiaVerified email at iitkgp.ac.in
Atul LuykxGoogleVerified email at google.com
Sikhar PatranabisIBM Research IndiaVerified email at ibm.com
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Ashrujit GhoshalCarnegie Mellon UniversityVerified email at cs.cmu.edu
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Lilian BossuetProfessor, University Jean Monnet, Saint-Etienne - Laboratoire Hubert Curien - CNRSVerified email at univ-st-etienne.fr
Donghoon ChangIIIT-Delhi, IndiaVerified email at iiitd.ac.in
Ferdinand SibleyrasNTT Social Informatics LaboratoriesVerified email at sibleyras.fr
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
Ritam BhaumikSenior Researcher, TII, Abu DhabiVerified email at tii.ae